SlideShare a Scribd company logo
1 IBM Security
LEADINGTHEWAY 2019
INTERNAL USE ONLY – DO NOT DISTRIBUTE
AI – What is it really?
Jeff Crume, CISSP-ISSAP
Nov 2018
Distinguished Engineer
IBM Master Inventor
crume@us.ibm.com
INTERNAL USE ONLY – DO NOT DISTRIBUTE
3 IBM Security INTERNAL USE ONLY – DO NOT DISTRIBUTE
AI Primer
INTERNAL USE ONLY – DO NOT DISTRIBUTE
5 IBM Security
• Webster - “a branch of computer science dealing with the simulation of intelligent
behavior in computers.” [1]
• OED - “the theory and development of computer systems able to perform tasks normally
requiring human intelligence, such as visual perception, speech recognition,
decision-making, and translation between languages.” [2]
• OK, but what does that mean in plain English?
AI essentially involves making computers more able to match or exceed human
intelligence in its various forms by mimicking the human ability to discover, infer and
reason.
AI Defined
[1] https://www.merriam-webster.com/dictionary/artificial%20intelligence
[2] https://en.oxforddictionaries.com/definition/artificial_intelligence
INTERNAL USE ONLY – DO NOT DISTRIBUTE
6 IBM Security
AI Technologies
 Reasoning, problem solving
 Knowledge representation
 Planning
 Learning
 Natural language processing
 Perception
 Motion and manipulation
 Social intelligence
 Creativity
 General intelligence
INTERNAL USE ONLY – DO NOT DISTRIBUTE
7 IBM Security
Artificial Intelligence and Sub Categories
Artificial Intelligence
Cognitive
Machine Learning
Deep Learning
o Machine learning is a subfield of AI and
computer science that has its roots in
statistics and mathematical optimization.
Machine learning covers techniques in
supervised and unsupervised learning for
applications in prediction, analytics, and
data mining.*
o Deep learning isn't an algorithm, per se,
but rather a family of algorithms that
implement deep networks with
unsupervised learning.*
* “A beginner's guide to artificial intelligence, machine learning, and cognitive computing”
https://www.ibm.com/developerworks/library/cc-beginner-guide-machine-learning-ai-cognitive/index.html
INTERNAL USE ONLY – DO NOT DISTRIBUTE
8 IBM Security
Introduction to Machine Learning
A subfield of computer science that enables computers to learn without being explictly
programmed
- Arthur Samuel in 1959
Supervised Learning
Inferring a general rule or mathematical
function from labeled training data to be
applied to other data
Primary Use Cases
• Regression Analysis
o Deriving correlation relationships
between variables and estimating the
strength of those relationships
o Widely used for prediction and
forecasting
• Classification:
o Produces a model from a training set
that can assign unseen inputs into
different categories
Unsupervised Learning
Detecting the presence of patterns or models
from unlabeled data
Primary Use Cases
• Clustering
o Data is divided into different groups
based on one or more attributes
• Dimensionality Reduction
o process of reducing the number of
random variables under consideration,
via obtaining a set of principal variables
o Feature Selection: finding subset of the
original variables
o Feature Extraction: transform high-
dimensional space to a space of fewer
dimensions
INTERNAL USE ONLY – DO NOT DISTRIBUTE
9 IBM Security
Cognitive computing enables systems to process and act on data,
like humans
They understand
 Intent, tone, personality
 Submissions, contracts,
claims
 Legal & regulatory
obligations, guidelines
 News, market data…
like humans do
They can
 Identify similar risks and
claims
 Assess risk
 Check for compliance
 Spot new sales
opportunities, …
infer and extract ideas
With abilities to see, talk
and hear they can support
 Clients, agents & broker
 Contact center agents
 Underwriter
 Claims handler
and many others
in a natural way
They learn from every
interaction and
 Extract and improve
best practices
 Digest new regulatory
requirements,
guidelines…
and never stop learning
ReasonUnderstand Interact Learn
INTERNAL USE ONLY – DO NOT DISTRIBUTE
10 IBM Security
Cognitive Solutions Reason and Present their Reasoning Process
Grep
Grep
Search
Pattern
Matching
Correlation
and rules
Behavioral
Analytics
Cognition
Increasing data volumes, variety and complexity
Increasingattackandthreatsophistication
Reasoning about
threats and risks
Helping security teams not only detect where the threat is but also resolving the
what, how, why, when and who to improve the overall incident response timeline
Recognition of threats and
risks
Cognitive Traits:
• language
comprehension
• deductive reasoning
and
• self-learning
INTERNAL USE ONLY – DO NOT DISTRIBUTE
11 IBM Security
Smart but not cognitive
INTERNAL USE ONLY – DO NOT DISTRIBUTE
AI in the Real World
INTERNAL USE ONLY – DO NOT DISTRIBUTE
13 IBM Security
13
Watson answers a grand challenge
Can we design a computing system that rivals a human’s ability to answer
questions posed in natural language, interpreting meaning and context and
retrieving, analyzing and understanding vast amounts of information in real-time?
INTERNAL USE ONLY – DO NOT DISTRIBUTE
14 IBM Security
3 Min 58 Sec 4 Min 35 Sec
Final Score: Rutter - $21,600 Jennings - $24,000 Watson - $77,147
INTERNAL USE ONLY – DO NOT DISTRIBUTE
15 IBM Security
From Jeopardy! To Cancer
• 60 Minutes profile Oct 2016
 IBM and UNC Lineberger Cancer Center
• 8,000 new medical research papers
published per day
• Studied 1,000 patients
• Watson recommendations matched
Tumor Board experts 99% of the
time
• Watson found additional treatment
options in 30% of cases
Transcript at https://www.cbsnews.com/amp/news/60-minutes-artificial-intelligence-charlie-rose-robot-sophia
INTERNAL USE ONLY – DO NOT DISTRIBUTE
16 IBM Security
www.ibm.com/security/artificial-intelligence
INTERNAL USE ONLY – DO NOT DISTRIBUTE
© Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
FOLLOW US ON:
THANK YOU
INTERNAL USE ONLY – DO NOT DISTRIBUTE

More Related Content

What's hot

The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
PECB
 
Hci activity#2
Hci activity#2Hci activity#2
Hci activity#2
Desalegn Aweke
 
Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
university of education,Lahore
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
Ajay Jassi
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013Ian Sommerville
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile security
Claus Cramon Houmann
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
Pace IT at Edmonds Community College
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
Burhan Ahmed
 

What's hot (9)

The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Hci activity#2
Hci activity#2Hci activity#2
Hci activity#2
 
Human Computer Interaction of an Information System
Human Computer Interaction of an Information SystemHuman Computer Interaction of an Information System
Human Computer Interaction of an Information System
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile security
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 

Similar to PCM Vision 2019 Keynote: Jeff Crume

PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
Toño Herrera
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
scoopnewsgroup
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
IBM Security
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
Thomas Springer
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
Prime Infoserv
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
Gerard McNamee
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
JoAnna Cheshire
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
IBM Sverige
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
IBM Security
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
EmanAzam
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
SPI Conference
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
Morten Bjørklund
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
EC-Council
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Trupti Shiralkar, CISSP
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas
 
Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?
HelpSystems
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
Jeff Miller
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
Patrick Bouillaud
 

Similar to PCM Vision 2019 Keynote: Jeff Crume (20)

PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 

More from PCM

PCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPIPCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPI
PCM
 
PCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: Dell
PCM
 
PCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: CiscoPCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: Cisco
PCM
 
PCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd PekatsPCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd Pekats
PCM
 
PCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: VeritasPCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: Veritas
PCM
 
PCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot BaretzPCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot Baretz
PCM
 
PCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest SoftwarePCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest Software
PCM
 
PCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: SamsungPCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: Samsung
PCM
 
PCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: SymantecPCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: Symantec
PCM
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
PCM
 
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim WarmanPCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWare
PCM
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: Zebra
PCM
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
PCM
 
#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite
PCM
 
#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions
PCM
 
#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity
PCM
 
#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides
PCM
 

More from PCM (18)

PCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPIPCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPI
 
PCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: Dell
 
PCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: CiscoPCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: Cisco
 
PCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd PekatsPCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd Pekats
 
PCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: VeritasPCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: Veritas
 
PCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot BaretzPCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot Baretz
 
PCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest SoftwarePCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest Software
 
PCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: SamsungPCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: Samsung
 
PCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: SymantecPCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: Symantec
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim WarmanPCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWare
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: Zebra
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite
 
#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions
 
#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity
 
#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

PCM Vision 2019 Keynote: Jeff Crume

  • 1. 1 IBM Security LEADINGTHEWAY 2019 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 2. AI – What is it really? Jeff Crume, CISSP-ISSAP Nov 2018 Distinguished Engineer IBM Master Inventor crume@us.ibm.com INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 3. 3 IBM Security INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 4. AI Primer INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 5. 5 IBM Security • Webster - “a branch of computer science dealing with the simulation of intelligent behavior in computers.” [1] • OED - “the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.” [2] • OK, but what does that mean in plain English? AI essentially involves making computers more able to match or exceed human intelligence in its various forms by mimicking the human ability to discover, infer and reason. AI Defined [1] https://www.merriam-webster.com/dictionary/artificial%20intelligence [2] https://en.oxforddictionaries.com/definition/artificial_intelligence INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 6. 6 IBM Security AI Technologies  Reasoning, problem solving  Knowledge representation  Planning  Learning  Natural language processing  Perception  Motion and manipulation  Social intelligence  Creativity  General intelligence INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 7. 7 IBM Security Artificial Intelligence and Sub Categories Artificial Intelligence Cognitive Machine Learning Deep Learning o Machine learning is a subfield of AI and computer science that has its roots in statistics and mathematical optimization. Machine learning covers techniques in supervised and unsupervised learning for applications in prediction, analytics, and data mining.* o Deep learning isn't an algorithm, per se, but rather a family of algorithms that implement deep networks with unsupervised learning.* * “A beginner's guide to artificial intelligence, machine learning, and cognitive computing” https://www.ibm.com/developerworks/library/cc-beginner-guide-machine-learning-ai-cognitive/index.html INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 8. 8 IBM Security Introduction to Machine Learning A subfield of computer science that enables computers to learn without being explictly programmed - Arthur Samuel in 1959 Supervised Learning Inferring a general rule or mathematical function from labeled training data to be applied to other data Primary Use Cases • Regression Analysis o Deriving correlation relationships between variables and estimating the strength of those relationships o Widely used for prediction and forecasting • Classification: o Produces a model from a training set that can assign unseen inputs into different categories Unsupervised Learning Detecting the presence of patterns or models from unlabeled data Primary Use Cases • Clustering o Data is divided into different groups based on one or more attributes • Dimensionality Reduction o process of reducing the number of random variables under consideration, via obtaining a set of principal variables o Feature Selection: finding subset of the original variables o Feature Extraction: transform high- dimensional space to a space of fewer dimensions INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 9. 9 IBM Security Cognitive computing enables systems to process and act on data, like humans They understand  Intent, tone, personality  Submissions, contracts, claims  Legal & regulatory obligations, guidelines  News, market data… like humans do They can  Identify similar risks and claims  Assess risk  Check for compliance  Spot new sales opportunities, … infer and extract ideas With abilities to see, talk and hear they can support  Clients, agents & broker  Contact center agents  Underwriter  Claims handler and many others in a natural way They learn from every interaction and  Extract and improve best practices  Digest new regulatory requirements, guidelines… and never stop learning ReasonUnderstand Interact Learn INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 10. 10 IBM Security Cognitive Solutions Reason and Present their Reasoning Process Grep Grep Search Pattern Matching Correlation and rules Behavioral Analytics Cognition Increasing data volumes, variety and complexity Increasingattackandthreatsophistication Reasoning about threats and risks Helping security teams not only detect where the threat is but also resolving the what, how, why, when and who to improve the overall incident response timeline Recognition of threats and risks Cognitive Traits: • language comprehension • deductive reasoning and • self-learning INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 11. 11 IBM Security Smart but not cognitive INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 12. AI in the Real World INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 13. 13 IBM Security 13 Watson answers a grand challenge Can we design a computing system that rivals a human’s ability to answer questions posed in natural language, interpreting meaning and context and retrieving, analyzing and understanding vast amounts of information in real-time? INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 14. 14 IBM Security 3 Min 58 Sec 4 Min 35 Sec Final Score: Rutter - $21,600 Jennings - $24,000 Watson - $77,147 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 15. 15 IBM Security From Jeopardy! To Cancer • 60 Minutes profile Oct 2016  IBM and UNC Lineberger Cancer Center • 8,000 new medical research papers published per day • Studied 1,000 patients • Watson recommendations matched Tumor Board experts 99% of the time • Watson found additional treatment options in 30% of cases Transcript at https://www.cbsnews.com/amp/news/60-minutes-artificial-intelligence-charlie-rose-robot-sophia INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 17. © Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions FOLLOW US ON: THANK YOU INTERNAL USE ONLY – DO NOT DISTRIBUTE